Sciweavers

729 search results - page 69 / 146
» A practical method for courseware evaluation
Sort
View
151
Voted
SBBD
2003
135views Database» more  SBBD 2003»
15 years 5 months ago
Privacy Preserving Clustering by Data Transformation
Despite its benefit in a wide range of applications, data mining techniques also have raised a number of ethical issues. Some such issues include those of privacy, data security,...
Stanley R. M. Oliveira, Osmar R. Zaïane
142
Voted
TMI
2010
155views more  TMI 2010»
14 years 10 months ago
3D Forward and Back-Projection for X-Ray CT Using Separable Footprints
The greatest impediment to practical adoption of iterative methods for X-ray CT is the computation burden of cone-beam forward and back-projectors. Moreover, forward and back-proje...
Yong Long, Jeffrey A. Fessler, James M. Balter
155
Voted
CVPR
2011
IEEE
14 years 7 months ago
Compact Hashing with Joint Optimization of Search Accuracy and Time
Similarity search, namely, finding approximate nearest neighborhoods, is the core of many large scale machine learning or vision applications. Recently, many research results dem...
Junfeng He, Regunathan Radhakrishnan, Shih-Fu Chan...
159
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Fine-grained location-free planarization in wireless sensor networks
—Extracting planar graph from network topologies is of great importance for efficient protocol design in wireless ad hoc and sensor networks. Previous techniques of planar topol...
Dezun Dong, Yunhao Liu, Xiangke Liao, Xiang-Yang L...
175
Voted
CVPR
2011
IEEE
14 years 11 months ago
2D Nonrigid Partial Shape Matching Using MCMC and Contour Subdivision
Shape matching has many applications in computer vision, such as shape classification, object recognition, object detection, and localization. In 2D cases, shape instances are 2D c...
Y. Cao, Z. Zhang, I. Czogiel, I. Dryden, S. Wang